Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

SEC Risk Alert

by David Schwalenberg
June 11, 2014

SEC Risk Alert Screenshot

The Securities and Exchange Commission’s (SEC) Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert describing their Cybersecurity Initiative. The SEC initiative focuses on what they define as the core components for ensuring thorough network environmental security. The SEC Risk Alert dashboard assists organizations in evaluating and improving their cybersecurity preparedness according to the standards found in Tenable’s SEC Risk Alert Reference Guide.

The SEC Risk alert has seven key requirements: 

  • Maintain accurate inventories
  • Maintain knowledge of normal operations
  • Discover vulnerabilities and track remediation progress
  • Prevent unauthorized activity
  • Monitor for malicious activity
  • Monitor for data loss
  • Measure compliance

The SEC Risk Alert dashboard assists organizations with achieving these goals. Tenable’s Tenable.sc allows a single console to administer continuous active scanning, passive detection, log analysis, vulnerability management, and compliance checking across an organization. Because Tenable.sc is completely scalable and customizable, dashboards and reports can be fine-tuned to deliver the most advanced analysis of cybersecurity risks.

The vulnerability data components offer insight into which hosts can be exploited and which vulnerabilities pose the greatest current threat to organizational security. The compliance related components show how many hosts adhere to the standards with which the organization has agreed to comply. Compliance adherence insight enables management to understand whether the scope and breadth of the configuration meets their business needs. Lastly, the event trending data on this dashboard is aimed at informing managers how many new devices are connected on a regular basis. New device information helps managers comprehend the rate at which new hardware is being deployed over time.

This dashboard is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The dashboard can be easily located in the Tenable.sc Feed under the Discovery & Detection category. The dashboard requirements are:

  • Tenable.sc 5.5.x
  • Nessus 8.5.1
  • LCE 6.0.0
  • NNM 5.9.1
  • LCE Client - Tenable NetFlow Monitor

Tenable's Tenable.sc Continuous View® (Tenable.sc CV™) provides continuous network monitoring, vulnerability identification and security monitoring. Tenable.sc CV™ is continuously updated with information about advanced threats, zero-day vulnerabilities and new types of regulatory compliance configuration audit files. Tenable constantly analyzes information from unique sensors, delivering continuous visibility and critical context, and enabling decisive action that transforms a security program from reactive to proactive. Active scanning periodically examines the applications on the systems, the running processes and services, web applications and configuration settings.  Passive listening provides real-time discovery of vulnerabilities on operating systems, protocols, network services, wireless devices, web applications, and critical infrastructure. Tenable.sc CV™ provides an organization with the most comprehensive view of the network and actionable information to support mitigation efforts and reduce cyber risk. Tenable enables powerful, yet non-disruptive, continuous monitoring that will provide organizations with the information needed to reduce risk within the enterprise.

 

Listed below are the included components:

  • Vulnerability Top Ten - Top 10 Remediations - This table displays the top 10 remediations for the network. For each remediation, the risk reduction for the network if the remediation is implemented is shown, along with the number of hosts affected. The list is sorted so that the highest risk reduction is at the top of the list. Implementing the remediations will decrease the vulnerability of the network.
  • Vulnerability Top Ten - Top 10 Exploitable Vulnerabilities - This table displays the top 10 exploitable vulnerabilities on the network. The list is sorted so that the most critical vulnerability is at the top of the list. For each vulnerability, the severity and the number of hosts affected is shown.
  • Vulnerability Top Ten - Top 10 Most Vulnerable Hosts - This table displays the 10 hosts on the network that have the greatest number of exploitable critical and high severity vulnerabilities. The list is sorted so that the most vulnerable host is at the top of the list. For each host, a bar graph of its critical and high severity vulnerabilities are shown.
  • Vulnerabilities Discovered (Last 30 Days) - This component displays vulnerability tracking information for the last 30 days. Information on Critical, High, and Medium severity vulnerabilities discovered in the past 30 days is presented, including the number of vulnerabilities that have been mitigated, number of vulnerabilities still unmitigated, number of unmitigated vulnerabilities that are exploitable, and the percentage of unmitigated vulnerabilities that are exploitable. This information can assist in assessing how well cybersecurity vulnerabilities are being managed.
  • Daily Host Alerts Trend (Last 5 Days) - This component presents a line graph of Daily_Host_Alert events by time for the last 5 days.
  • Netflow by Port (Last 72 Hours) - This chart displays the top 10 TCP ports with the highest session counts. This information can assist in understanding and monitoring the dataflows and services active on the network. Note that this component requires the Tenable NetFlow Monitor (TFM) LCE client.
  • Top 100 Users Generating Events (Last 72 Hours) - This table displays the top 100 users generating events on the network, with trending. This information can assist in monitoring the users accessing the network.
  • Malware Detections - This matrix displays various indications of malware and malicious cybersecurity events on the network. Red indicators signify that activity of high severity has occurred.
  • Network Changes - This matrix displays various indications of network changes over the last 72 hours. Green indicators signify that a change has occurred, and further investigation may be warranted to determine if the change was authorized.
  • Potential Suspicious Activity - This matrix displays various indications of network activity over the last 72 hours that departs from the baseline or may otherwise be suspicious. Spikes in event rates can indicate new applications, new types of network usage, and in some cases, abuse. Green indicators signify that the activity has occurred, and further investigation may be warranted to determine if the activity is authorized.
  • Potential Data Loss - This matrix displays various indications of potential for data leakage and loss. Red indicators signify that activity of high severity has occurred. Green indicators signify that activity that has the potential for data loss has occurred and further investigation may be warranted.
  • Compliance Summary - Check Result Ratio - This component provides a ratio view of systems that have been checked for a variety of compliance standards. The ratio bar provides a visual of the number of compliance checks that have either passed, failed, or that require some manual verification.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training